Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=aa5e1fe7d1af9a5e5a118547d4f7947bc05d54d7

commit aa5e1fe7d1af9a5e5a118547d4f7947bc05d54d7
Author: voroskoi <[EMAIL PROTECTED]>
Date:   Thu Sep 6 11:24:53 2007 +0200

FSA256-tor

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 3c8f571..0cfabe7 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -27,6 +27,19 @@

<fsas>
<fsa>
+               <id>256</id>
+               <date>2007-09-06</date>
+               <author>voroskoi</author>
+               <package>tor</package>
+               <vulnerable>0.1.2.14-1terminus1</vulnerable>
+               <unaffected>0.1.2.16-1terminus1</unaffected>
+               <bts>http://bugs.frugalware.org/task/2365</bts>
+               
<cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4174</cve>
+               <desc>A vulnerability has been reported in Tor, which can be 
exploited by malicious people to bypass certain security restrictions.
+                       The vulnerability is caused due to the ControlPort 
(localhost:9051) handling commands without authentication when the first 
command was not a successful "authenticate" command. This can be exploited to 
e.g. modify the "torrc" file, when a user views a malicious web page containing 
a specially crafted POST request or via a malicious tor exit node.
+                       Successful exploitation may compromise a user's 
anonymity, but requires that the ControlPort is enabled.</desc>
+       </fsa>
+       <fsa>
<id>255</id>
<date>2007-09-06</date>
<author>voroskoi</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to